Thanks everybody. Good and valuable discussion for me. As a result of this discussion we say that, "if you can see something, you can copy it"
Regards. 2012/5/31 Kristopher Micinski <[email protected]> > I think Mark and I were both trying to give reasons as to why this > would be hard / impossible no matter what, which, yes, I agree with > you. > > kris > > On Thu, May 31, 2012 at 9:15 AM, JP <[email protected]> wrote: > > > > Correct me if I am wrong folks, any encryption key and method that > > would be used to decrypt resource files would be obfuscated by > > Proguard, assuming the key is kept in the Java source, no? > > So OP would use key-and-method to encrypt resource files in the > > development environment and package the encrypted resource files with > > the apk. At runtime, extract the resource, decrypt using the key and > > go. > > > > > > BTW, this: > >> Download them from the Internet only on demand, and only ever hold them > in RAM. > > doesn't help much. The URLs of resource files could easily be packet- > > sniffed when the device is running on WiFi, and used to milk the > > resource files off of the OP's web server. > > > > > > > > On May 31, 4:47 am, Kristopher Micinski <[email protected]> > > wrote: > >> that's right, as (I forgot) the OP said this would have to be done > >> without any user authentication or anything on the internet.. > >> > >> kris > >> > >> > >> > >> > >> > >> > >> > >> On Thu, May 31, 2012 at 6:32 AM, Mark Murphy <[email protected]> > wrote: > >> > On Thu, May 31, 2012 at 2:15 AM, Kristopher Micinski > >> > <[email protected]> wrote: > >> >> In that case, there's not really any way to *really* protect your > >> >> files..., basically. You could imagine doing some complicated thing > >> >> with encrypting them, but then even if you display them, the user can > >> >> still do something like capture the framebuffer, or just grab the raw > >> >> bytes from the vm (that would, of course, require a rooted device..). > >> > >> > Or decompile the APK, find the encryption algorithm and key, and > >> > decrypt the images. > >> > >> > -- > >> > Mark Murphy (a Commons Guy) > >> >http://commonsware.com|http://github.com/commonsguy > >> >http://commonsware.com/blog|http://twitter.com/commonsguy > >> > >> > _The Busy Coder's Guide to Android Development_ Version 3.7 Available! > >> > >> > -- > >> > You received this message because you are subscribed to the Google > >> > Groups "Android Developers" group. > >> > To post to this group, send email to > [email protected] > >> > To unsubscribe from this group, send email to > >> > [email protected] > >> > For more options, visit this group at > >> >http://groups.google.com/group/android-developers?hl=en > > > > -- > > You received this message because you are subscribed to the Google > > Groups "Android Developers" group. > > To post to this group, send email to [email protected] > > To unsubscribe from this group, send email to > > [email protected] > > For more options, visit this group at > > http://groups.google.com/group/android-developers?hl=en > > -- > You received this message because you are subscribed to the Google > Groups "Android Developers" group. > To post to this group, send email to [email protected] > To unsubscribe from this group, send email to > [email protected] > For more options, visit this group at > http://groups.google.com/group/android-developers?hl=en > -- Göksel GÜREN www.gokselguren.com www.likeornot.me www.getitandroid.com -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

